000 | 03300nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-03326-2 | ||
003 | DE-He213 | ||
005 | 20240730165908.0 | ||
007 | cr nn 008mamaa | ||
008 | 181026s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030033262 _9978-3-030-03326-2 |
||
024 | 7 |
_a10.1007/978-3-030-03326-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aAdvances in Cryptology - ASIACRYPT 2018 _h[electronic resource] : _b24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I / _cedited by Thomas Peyrin, Steven Galbraith. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXXIV, 659 p. 120 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11272 |
|
505 | 0 | _aPost-Quantum Cryptanalysis -- Encrypted Storage -- Symmetric-Key Constructions -- Lattice Cryptography -- Quantum Symmetric Cryptanalysis -- Zero-Knowledge. | |
520 | _aThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer Communication Networks. _991067 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
700 | 1 |
_aPeyrin, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _991068 |
|
700 | 1 |
_aGalbraith, Steven. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _991069 |
|
710 | 2 |
_aSpringerLink (Online service) _991070 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030033255 |
776 | 0 | 8 |
_iPrinted edition: _z9783030033279 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11272 _991071 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-03326-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86604 _d86604 |